Table 3.
A comparative study between the most recent IoT datasets.
| IoT datasets | Year | Attack categories | Availability | Authors | Application | Developer | Web link | Labeled data |
Size | Drawbacks |
|---|---|---|---|---|---|---|---|---|---|---|
| MQTT-IoT-IDS202036 | 2020 | MQTT brute-force attack, UDP scan, Sparta SSH brute-force, and Aggressive scan |
Yes/Free/ Downloadable |
H. Hindy, C. Tachtatzis, R. Atkinson, E. Bayne, X. Bellekens | IoT cybersecurity | IEEE Data Port | https://ieee-dataport.org/open-access/mqtt-iot-ids2020-mqtt-internet-things-intrusion-detection-dataset | Yes | Approx. 1.65 GB | MQTT-IoT-IDS2020 exclusively focused on the MQTT protocol |
| MQTTSet37 | 2021 | DoS, SlowITe, Flooding, Bruteforce, and Malformed data |
Yes/Free/ Downloadable |
I. Vaccari, G. Chiola, M. Aiello, M. Mongelli, and E. Cambiaso | IoT cybersecurity | – | https://www.kaggle.com/cnrieiit/mqttset | Yes | 10 GB | MQTTSet only applicable on the MQTT protocol |
| IOT-2338 | 2020 | Nine attack categories |
Yes/Free/ Downloadable |
S. Garcia, A. Parmisano, and M. J. Erquiaga | IoT cybersecurity | Avast, AIC group, CTU | https://zenodo.org/record/4743746#.YXeyAhyEZPY | Yes | 21 GB | IOT-23 lacks some kinds of attacks |
| Bot-IoT39 | 2018 | DDoS, DoS, reconnaissance, and theft |
Yes/Free/ Downloadable |
K. Nickolaos, M. Nour, E. Sitnikova, and T. Benjamin, | IoT botnet | Cyber Range Lab of the University of New South Wales (UNSW) Canberra Cyber | https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-NB15-Datasets/bot_iot.php | Yes | 69.3 GB | Bot_IoT lacks some kinds of attacks and does not contain the different types of the applications of IoT |
| TON_IoT40 | 2020 | DDoS, DoS, Scanning, password cracking attack, XSS, data injection, ransomware, backdoor and MITM attack |
Yes/Free/ Downloadable |
N. Moustafa | IoT/IIoT cybersecurity | ACCS (Australian Centre for Cyber Security’s) Cyber Range Lab | https://ieee-dataport.org/documents/toniot-datasets | Yes | 67 GB | – |